Open Access iconOpen Access



Trusted Cluster-Based Communication for Wireless Sensor Network Using Meta-Heuristic Algorithms

Pankaj Kumar Sharma1,*, Uma Shankar Modani2

1 Department of Computer Engineeing, Mahila Engineering College, Ajmer, India
2 Department of E&C Engineering, Engineering College, Ajmer, India

* Corresponding Author: Pankaj Kumar Sharma. Email: email

Computer Systems Science and Engineering 2023, 45(2), 1935-1951.


The mobile transient and sensor network’s routing algorithm detects available multi-hop paths between source and destination nodes. However, some methods are not as reliable or trustworthy as expected. Therefore, finding a reliable method is an important factor in improving communication security. For further enhancement of protected communication, we suggest a trust cluster based secure routing (TCSR) framework for wireless sensor network (WSN) using optimization algorithms. First, we introduce an efficient cluster formation using a modified tug of war optimization (MTWO) algorithm, which provides load-balanced clusters for energy-efficient data transmission. Second, we illustrate the optimal head selection using multiple design constraints received signal strength, congestion rate, data loss rate, and throughput of the node. Those parameters are optimized by a butterfly optimal deep neural network (BO-DNN), which provides first-level security towards the selection of the best head node. Third, we utilize the lightweight signcryption to encrypt the data between two nodes during data transmission, which provides second-level security. The model provides an estimation of the trust level of each route to help a source node to select the most secure one. The nodes of the network improve reliability and security by maintaining the reliability component. Simulation results showed that the proposed scheme achieved 45.6% of delivery ratio.


Cite This Article

P. K. Sharma and U. S. Modani, "Trusted cluster-based communication for wireless sensor network using meta-heuristic algorithms," Computer Systems Science and Engineering, vol. 45, no.2, pp. 1935–1951, 2023.

cc This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 598


  • 377


  • 0


Share Link